Site hosted by Angelfire.com: Build your free website today!

Page01

Page02

Page03

Page04

Page05

Page06

Page07

Page08

Page09 Page10

HOME

"All people dream: but not equally.Those who dream by night in the dusty recesses of their minds wake in the day to find that it was vanity; but the dreamers of the day are dangerous people,for they may act their dreams with open eye, to make it possible."

T.E. Lawrence .

 Team

This Website is designed together by the Malmon team consisting Ahmad Mohamad, Saiful Islam and Jaafar Najmuddin.

 

GB 3020 PROJECT

Denial of service (DOS)

Home users should be cautious that they are as much likely vulnerable to DOS attacks just like any other organizations. DOS ranges from flooding a network to disrupting connections between two legitimate machines. This attack could essentially disable your computer and slow down the performance thus affecting the stability of your computer. A major risk caused by DOS attack is the loss of availability to information, when information becomes inaccessible to an authorized  user.

Distributed Denial of Service (DDOS) Agent

Lately, home users' PCs have become targets for DDOS agents. Recent reports by  reveals there is an increasing number of compromises on home users' PC which are then used as launching ground for attacking other systems in a distributed denial of service. In a distributed denial of service, a few compromised PCs are used as DDOS agent by using Trojan programs and they are instructed by a single “handler” to launch denial of service. Thus your computer is just a convenient tool or a contributor in a larger attack. A new DOS program, the Tribe Flood Network is installed in compromised computers weeks or months before the attack. Another DDOS tool known as "Knight" was found on approximately 1500 hosts as reported by CERT Advisory CA-2001-20. This tool also uses IRC as the control channel.

Email spoofing 

Home users are also vulnerable to the threat of email spoofing. When someone spoofs your email, it means that he/she is sending a fraud email message making it appears to come from one legal sender when actually it comes from another illegal sender. The main purpose of such malicious act can be to impersonate an actual user into making a damaging statement or revealing confidential information, thus risking the confidentiality of the information. An example is as an email claiming from your ISP requesting your username/password or account information or to change your password.

Worms transmitted via email attachments Windows users are exposed to the threat of worms and other types of malicious code which are often spread as attachments to e-mail messages, particularly via Microsoft email programs. An example is the Melissa virus, discovered in April 1999 which spread precisely because it originated from a familiar address. Also, malicious codes can be distributed in amusing or attractive programs. Another example is the wide spread of W32SIRCAM worm, discovered in July 2001, which propagates via Microsoft Outlook email programs and comes in various attractive attachments loaded with personal files belonging to the victim and is a temptation to any users to open the attachment.

 

Thanks For Visiting Our Site

Site Map

| PYTHON | BLACKBOARD | WEBMAIL | NPS | HOME |

Yahoo! GeoCities Member Banner Exchange



TODAY 

This is the beginning of a New Day. I have this day to use as I will. I can waste it or grow in its light and be of service to others.
But what I do with this day is important because I have exchange a day of my life for it. When tomorrow comes, today will be gone forever. I hope I will not regret the price I paid for it."

 Today :



1